Author of the publication

Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications.

, , , , , and . Middleware, volume 6452 of Lecture Notes in Computer Science, page 212-231. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Cyberbullying and Cyberaggression in Social Media., , , , , , and . ACM Trans. Web, 13 (3): 17:1-17:51 (2019)The Minimum Wiener Connector., , , , and . CoRR, (2015)A survey on privacy for B5G/6G: New privacy challenges, and research directions., , , , and . J. Ind. Inf. Integr., (2022)Stock trade volume prediction with Yahoo Finance user browsing behavior., , , and . ICDE, page 1168-1173. IEEE Computer Society, (2014)If you are not paying for it, you are the product: how much do advertisers pay to reach you?, , , and . Internet Measurement Conference, page 142-156. ACM, (2017)YouTubing at Home: Media Sharing Behavior Change as Proxy for Mobility Around COVID-19 Lockdowns., and . WebSci, page 272-281. ACM, (2021)A longitudinal study of the top 1% toxic Twitter profiles., , , , , and . WebSci, page 292-303. ACM, (2023)Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children., , , , , , , and . ICWSM, page 522-533. AAAI Press, (2020)Privacy-Preserving Online Content Moderation: A Federated Learning Use Case., , , and . CoRR, (2022)Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users., , , , , and . IEEE Big Data, page 3624-3633. IEEE, (2023)